[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[gnurl] 84/264: SSLCERTS.md: Fix example code for setting CA cert file
From: |
gnunet |
Subject: |
[gnurl] 84/264: SSLCERTS.md: Fix example code for setting CA cert file |
Date: |
Thu, 30 Apr 2020 16:06:27 +0200 |
This is an automated email from the git hooks/post-receive script.
nikita pushed a commit to branch master
in repository gnurl.
commit 0d0537aeae2acdbdb43c6aab834abf84ca7ba247
Author: Jay Satiro <address@hidden>
AuthorDate: Thu Mar 26 18:11:28 2020 -0400
SSLCERTS.md: Fix example code for setting CA cert file
Prior to this change the documentation erroneously said use
CURLOPT_CAPATH to set a CA cert file.
Bug: https://curl.haxx.se/mail/lib-2020-03/0121.html
Reported-by: Timothe Litt
Closes https://github.com/curl/curl/pull/5151
---
docs/SSLCERTS.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/docs/SSLCERTS.md b/docs/SSLCERTS.md
index 2c5be68e6..fcbc4646e 100644
--- a/docs/SSLCERTS.md
+++ b/docs/SSLCERTS.md
@@ -55,7 +55,7 @@ server, do one of the following:
2. Get a CA certificate that can verify the remote server and use the proper
option to point out this CA cert for verification when connecting. For
- libcurl hackers: `curl_easy_setopt(curl, CURLOPT_CAPATH, capath);`
+ libcurl hackers: `curl_easy_setopt(curl, CURLOPT_CAINFO, cacert);`
With the curl command line tool: --cacert [file]
@@ -104,7 +104,7 @@ server, do one of the following:
the security is no better than the way you obtained the certificate.
4. If you're using the curl command line tool, you can specify your own CA
- cert path by setting the environment variable `CURL_CA_BUNDLE` to the path
+ cert file by setting the environment variable `CURL_CA_BUNDLE` to the path
of your choice.
If you're using the curl command line tool on Windows, curl will search
--
To stop receiving notification emails like this one, please contact
address@hidden.
- [gnurl] 115/264: CI-fuzz: increase fuzz time to 40 minutes, (continued)
- [gnurl] 115/264: CI-fuzz: increase fuzz time to 40 minutes, gnunet, 2020/04/30
- [gnurl] 126/264: appveyor: show failed tests in log even if test is ignored, gnunet, 2020/04/30
- [gnurl] 101/264: checksrc: warn on obvious conditional blocks on the same line as if(), gnunet, 2020/04/30
- [gnurl] 133/264: scripts/release-notes.pl: add helper script for RELEASE-NOTES maintenance, gnunet, 2020/04/30
- [gnurl] 132/264: configure: don't check for Security.framework when cross-compiling, gnunet, 2020/04/30
- [gnurl] 74/264: copyright: fix out-of-date copyright ranges and missing headers, gnunet, 2020/04/30
- [gnurl] 39/264: windows: suppress UI in all CryptAcquireContext() calls, gnunet, 2020/04/30
- [gnurl] 53/264: mbedtls: remove the BACKEND define kludge, gnunet, 2020/04/30
- [gnurl] 61/264: curl_setup: define _WIN32_WINNT_[OS] symbols, gnunet, 2020/04/30
- [gnurl] 55/264: test970: fix static ip:port instead of dynamic values being used, gnunet, 2020/04/30
- [gnurl] 84/264: SSLCERTS.md: Fix example code for setting CA cert file,
gnunet <=
- [gnurl] 88/264: writeout_json: Fix data type issues, gnunet, 2020/04/30
- [gnurl] 93/264: KNOWN_BUGS: DoH doesn't inherit all transfer options, gnunet, 2020/04/30
- [gnurl] 179/264: cmake: add aliases so exported target names are available in tree, gnunet, 2020/04/30
- [gnurl] 46/264: writeout_json: use curl_off_t printf() option for the time output, gnunet, 2020/04/30
- [gnurl] 58/264: tests: add test 430, 431 and 432 to verify the --config fix, gnunet, 2020/04/30
- [gnurl] 60/264: curl-functions.m4: remove inappropriate AC_REQUIRE, gnunet, 2020/04/30
- [gnurl] 119/264: KNOWN_BUGS: Store TLS context per transfer instead of per connection, gnunet, 2020/04/30
- [gnurl] 92/264: KNOWN_BUGS: DoH leaks memory after followlocation, gnunet, 2020/04/30
- [gnurl] 98/264: SECURITY.md: minor rephrase, gnunet, 2020/04/30
- [gnurl] 125/264: appveyor: turn disabled tests into ignored result tests, gnunet, 2020/04/30